CVE-2021-22007
https://notcve.org/view.php?id=CVE-2021-22007
The vCenter Server contains a local information disclosure vulnerability in the Analytics service. An authenticated user with non-administrative privilege may exploit this issue to gain access to sensitive information. vCenter Server contiene una vulnerabilidad de divulgación de información local en el servicio Analytics. Un usuario autenticado con privilegios no administrativos puede explotar este problema para conseguir acceso a información confidencial • https://www.vmware.com/security/advisories/VMSA-2021-0020.html •
CVE-2021-22006
https://notcve.org/view.php?id=CVE-2021-22006
The vCenter Server contains a reverse proxy bypass vulnerability due to the way the endpoints handle the URI. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to access restricted endpoints. vCenter Server contiene una vulnerabilidad de omisión de proxy inverso debido a la forma en que los endpoints manejan el URI. Un actor malicioso con acceso a la red al puerto 443 de vCenter Server puede explotar este problema para acceder a endpoints restringidos • https://github.com/CrackerCat/CVE-2021-22006 https://www.vmware.com/security/advisories/VMSA-2021-0020.html •
CVE-2021-22005 – VMware vCenter Server File Upload Vulnerability
https://notcve.org/view.php?id=CVE-2021-22005
The vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file. vCenter Server contiene una vulnerabilidad de carga de archivos arbitraria en el servicio Analytics. Un actor malicioso con acceso de red al puerto 443 en vCenter Server puede explotar este problema para ejecutar código en vCenter Server cargando un archivo especialmente diseñado VMware vCenter Server contains a file upload vulnerability in the Analytics service that allows a user with network access to port 443 to execute code. • https://github.com/rwincey/CVE-2021-22005 https://github.com/TaroballzChen/CVE-2021-22005-metasploit https://github.com/5gstudent/CVE-2021-22005- https://github.com/Jun-5heng/CVE-2021-22005 https://github.com/1ZRR4H/CVE-2021-22005 https://github.com/tiagob0b/CVE-2021-22005 https://github.com/timb-machine-mirrors/testanull-CVE-2021-22005.py https://github.com/pisut4152/Sigma-Rule-for-CVE-2021-22005-scanning-activity http://packetstormsecurity.com/files/164439/VMware-vCenter-Server-An • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2021-21993
https://notcve.org/view.php?id=CVE-2021-21993
The vCenter Server contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in vCenter Server Content Library. An authorised user with access to content library may exploit this issue by sending a POST request to vCenter Server leading to information disclosure. vCenter Server contiene una vulnerabilidad de tipo SSRF (Server Side Request Forgery) debido a una comprobación inapropiada de las URL en la biblioteca de contenidos del servidor vCenter. Un usuario autorizado con acceso a la biblioteca de contenidos puede explotar este problema mediante el envío de una petición POST a vCenter Server conllevando a una divulgación de información • https://www.vmware.com/security/advisories/VMSA-2021-0020.html • CWE-918: Server-Side Request Forgery (SSRF) •
CVE-2021-22015 – VMware vCenter Server Appliance Incorrect Permission Assignment Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2021-22015
The vCenter Server contains multiple local privilege escalation vulnerabilities due to improper permissions of files and directories. An authenticated local user with non-administrative privilege may exploit these issues to elevate their privileges to root on vCenter Server Appliance. vCenter Server contiene múltiples vulnerabilidades de escalada de privilegios locales debido a permisos inapropiados de archivos y directorios. Un usuario local autenticado con privilegios no administrativos puede explotar estos problemas para elevar sus privilegios a root en vCenter Server Appliance This vulnerability allows local attackers to escalate privileges on affected installations of VMware vCenter Server Appliance. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the permissions of root-owned service files. The product sets incorrect permissions on sensitive files. • https://github.com/PenteraIO/vScalation-CVE-2021-22015 http://packetstormsecurity.com/files/170116/VMware-vCenter-vScalation-Privilege-Escalation.html https://www.vmware.com/security/advisories/VMSA-2021-0020.html • CWE-552: Files or Directories Accessible to External Parties •